Rational authentication protocols
We use ideas from game theory to transform two families of authentication protocols so that even an intruder attacks a protocol, its payoff will still be lower than when it does not. This is particularly useful in resisting or discouraging a powerful and rational intruder (as present in military app...
Main Author: | Nguyen, L |
---|---|
Format: | Journal article |
Published: |
2011
|
Similar Items
-
Authentication protocols in pervasive computing
by: Nguyen, L
Published: (2009) -
On the construction of digest functions for manual authentication protocols
by: Nguyen, L, et al.
Published: (2011) -
Efficient group authentication protocol based on human interaction
by: Nguyen, L, et al.
Published: (2006) -
Efficient group authentication protocols based on human interaction
by: Roscoe, A, et al.
Published: (2006) -
Rational distance−bounding protocols over noisy channels
by: Nguyen, L
Published: (2011)